Saturday, October 30, 2010

Hi I was wondring how yur gdi business was going and if you were still involved or if you had moved on to another business. I always like to check with other home based people to see whats hot and whats not. Please drop me a line and let me know .thanks so much terry ganas

Hi I was wondring how yur gdi business was going and if you were still involved or if you had moved on to another business. I always like to check with other home based people to see whats hot and whats not. Please drop me a line and let me know .thanks so much terry ganas

Why Enterprise WiFi Belongs in the Cloud Effective management is key to wireless success. Join this live Webcast to hear how cloud-controlled wireless management provides the security, remote administration and reliability resource-constrained IT departments require. See real-world examples of organizations that have successfully deployed enterprise WiFi in the cloud. Learn more now!

Most popular stories this week: Oct. 29 The most-viewed stories at Network World for the week ending Oct. 29.From vintage Steve Jobs, to Ubuntu's surprising move, to 25 hot new companies and products, it was a very interesting week at Network World. Check out the full list. Read More

The CIA And The Encrypted Enterprise I participated in the Virtualization, Cloud, and Green Computing event in our nation's capital this week. One of the guest speakers was Ira "Gus" Hunt, CTO at the CIA. If you haven't seen Gus speak, you are missing something. He is very strong on the technical side and extremely energetic and entertaining. Read More

Mastering the Art of the Cisco Kool-Aid Keg Stand It seems very appropriate for my final post that I put the emerging data center technologies all together in an end-to-end architecture. In the words of some of the readers, what better way to illustrate how psyched I am about these technologies than with a keg stand - and mind you, no less than a Cisco Kool-Aid keg stand. Read More

The Google Android Quiz Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

The ten practices described in this TDWI checklist report detail the current data integration landscape. The report dispels common myths, but more importantly demonstrates how sophisticated and powerful data integration can be. These best practices will help you achieve high-value from data integration tools and techniques.

Domestic violence is a serious problem that can sometimes affect the workplace, regardless of industry. Although there have been cases of abusers killing their victims at their workplace, the abuser does not actually need to be present at the office in order to cause a disruption, according to a recent domestic violence and the workplace seminar held by Kilpatrick Stockton in Atlanta. During the seminar, participants discussed how employers can help domestic violence victims. For example, human resources directors should be on the lookout for potential signs of abuse such as disruptive phone calls, sudden performance changes, or missed work. The employer's first concern in a situation of suspected abuse should be to help the employee keep their job, because financial independence can help the survivor get away from their situation. Unfortunately, supervisors and co-workers are often hesitant to intervene if they suspect someone is being abused because they do not know how to help. However, speakers at the seminar encouraged participants to ask co-workers if they feel safe in their home should they think abuse may be a factor. Participants were also asked to connect employees with community organizations that can provide the counseling and support. Several people suggested putting pamphlets in both the men's and women's bathrooms with contact information for domestic violence aid organizations, so people in abusive situations do not have to draw attention to themselves when looking for resources. Another option is to host lunch-and-learn programs on the subject of domestic violence.

France has begun enforcing a new law that aims to crackdown on Internet users who illegally download films and music from the Internet. As part of the effort to crackdown on Internet piracy, which is believed to cost France's music industry $978 million per year, the French government has hired a private company to monitor file-sharing sites to catch those illegally downloading music or videos. The private company then passes the IP address of offenders on to "Hadopi," which is the acronym for the agency that is responsible for implementing the anti-piracy law. After receiving the IP addresses of illegal downloaders from the company, Hadopi contacts Internet service providers to get the e-mail addresses of the offenders so that they can be warned to stop. If users are found to have illegally downloaded music or videos again within six months, they are sent another warning via registered letter. Charges can be brought and the user can be banned from the Internet for a year if there is a third offense. Enforcing the law has been difficult, as some Internet service providers have been hesitant to cooperate. Officials in South Korea, Taiwan, and the U.K. have enacted anti-piracy laws similar to the one in France, and they are watching how Paris implements its statute.

Police in Call for New Powers to Close Down Rogue Scrap Metal MerchantsBolton News (Lancashire, U.K.) (10/26/10)

With metal theft in the U.K. on the rise, British police chiefs are calling for new powers to shut down scrap metal merchants who buy stolen copper wire. According to the British Transport Police, there have been 1,855 cable related incidents so far this year. BTP also said that it has arrested 500 suspected metal thieves. Bolton, England, has been hit especially hard by a number of high-profile metal thefts, including a raid on M&A Pharmaceutical in Wingates, which resulted in more than £100,000 in damage. The BTP says that metal stolen in thefts like the one at M&A Pharmaceutical is generally exported via scrap yards and often ends up in China, where copper is being stockpiled. Meanwhile, the association of chief police officers and the British Metal Recycling Association have designed a code of conduct for scrap metal dealers, which includes taking reasonable steps to ensure that they do not buy stolen metal.

Prescription-Drug Use an Issue for EmployersSeattle Times (10/25/10) Zezima, Katie; Goodnough, Abby

Employers are struggling to find ways to address their employees' growing use of prescription drugs that could cause safety problems in the workplace. According to an analysis of more than 500,000 drug tests by the workplace drug test provider Quest Diagnostics, the number of employees who tested positive for prescription opiates between 2005 and 2009 increased by more than 40 percent. But many employers have not addressed prescription drug use among their employees, even though they could be held liable for industrial accidents, defective products, and on-the-job injuries caused by a worker who abuses prescription drugs, said Mark de Bernardo, the executive director of the Institute for a Drug-Free Workplace. One reason why many employers have not addressed prescription drug use is that it can be difficult to prove that a worker is impaired by a prescription drug. Although employers can ask employees who work in positions where safety is important to notify them about their prescription drug use, they cannot be certain that they will do so. It can also be difficult to develop policies governing the use of prescription drugs because the Americans with Disabilities Act forbids companies from asking their workers about their prescription drug use unless they are seen acting in ways that could be unsafe or in ways that show that they cannot perform the duties of their jobs for medical reasons. But experts say that companies can protect themselves from the problems caused by prescription drug use by establishing thorough and consistent policies that describe which drugs workers can be tested for and under what circumstances. In addition, supervisors should be trained to look for signs that workers are impaired by prescription drugs so that they can legally be tested.

Chief executives often face unique threats that are not faced by company presidents, requiring a different approach to security. Private-sector leaders may be targeted for a variety of reasons, including their wealth and community presence, and business controversies -- for instance, companies that perform product testing on animals, make pharmaceuticals, or drill for oil can attract threats. Many protection agencies neglect to consider job-specific security requirements, and whether their employees are adequately qualified for the job. Christopher Falkenberg, president of Insite Security, argues in this column that the model for executive protection in the private sector is broken, and that the security industry has failed to offer up real solutions for executives and their families. He says that executive protection must be approached from the ground up. Examine the legitimate risks to the executive and his or her family: Where do they live? How can vulnerable situations be avoided? Is there a pattern or threatening behavior? "This is a wakeup call for the industry -- to both private sector providers and corporate security providers -- the service offering is predicated on a model that doesn't apply to them," says Falkenberg. "Executives don't live in the 'presidential' market place. As security professionals, we need to find the best intersection between conveniences and effective security."

Officials have revealed how they came to learn about the 34-year-old Pakistani-American man who allegedly planned to attack the Washington, D.C., Metrorail system. According to officials, 34-year-old Farooque Ahmed of Ashburn, Va., came to the attention of investigators after he and an associate attempted to make contact with a terrorist organization to help them travel to Afghanistan or Pakistan so that they could fight U.S. forces in those countries. After determining that Ahmed was potentially dangerous, the FBI devised a sting operation in which an undercover agent posing as an operative with a terrorist group asked the suspects for their help in gathering information for the planned bombings. Such stings have become a popular tool for disrupting domestic terrorist plots in the wake of the September 11, 2001 attacks. Former FBI agent Peter Ahearn said that sting operations are useful because they make potential terrorists afraid that anyone they contact could be an undercover agent. However, lawyers for the seven members of a Miami religious group who were arrested in 2006 for plotting to attack the Sears Tower in Chicago and federal buildings say that undercover informants seemed to entrap their clients. That case resulted in two mistrials, though a third trial resulted in the conviction of five of the defendants on terrorism-related charges.

The FBI has linked a shooting at a Marine Corps recruiting station in Chantilly, Va., earlier this week with previous shootings at the Pentagon and the National Museum of the Marine Corps in Triangle, Va. According to the FBI, the weapon that was used at the recruiting station shooting was also used in the incidents at the Marine Corps museum and the Pentagon, which took place on Oct. 17 and Oct. 19, respectively. In addition, all three shootings took place late at night or early in the morning when the buildings were empty or when it was unlikely that people would be around. The Marine Corps recruiting station was also vacant at the time of the shooting. Authorities say that they do not have a motive for any of the shootings, though they say they are following all possible leads.

An Ashburn, Va., man was arrested on Wednesday on charges of planning to bomb four stations on Washington, D.C.'s Metro system. According to an official with the Obama administration, 34-year-old Farooque Ahmed--a naturalized U.S. citizen who is originally from Pakistan--came to the attention of authorities after he tried to obtain several unspecified materials. Law enforcement officials then launched a sting operation against Ahmed, during which he allegedly told federal agents posing as Islamic radicals that he would conduct video surveillance of the Arlington Cemetery, Pentagon City, Crystal City, and Court House Metro stations in Virginia. In addition, Ahmed allegedly suggested the best time to attack the stations and the best locations to place bombs. Ahmed then later gave authorities the video and sketches he made of the Metro stations, according to a federal indictment. Intelligence sources said that it does not appear that Ahmed received training from al-Qaida or any affiliated organizations, though other terrorism investigations have turned up ties between suspects and overseas terrorist organizations several days after arrests were made. Despite the plot, officials say that the public was never in any danger.

Republicans are currently challenging the Obama administration's decision to transfer some Guantanamo Bay detainees to prison in Europe. Republican staffers for the Senate Intelligence Committee were paid to travel to Spain, Germany, France, and other countries to see if they could uncover any evidence that the security around the detainees was lacking. Although President Obama ordered Guantanamo Bay closed on his second day in office, Republicans have been largely successful in blocking that attempt. Transferring detainees to Europe and some other countries has been the administration's most successful strategy, with 66 detainees already moved. Staffers aware of the trip have declined to comment on whether or not they found any evidence of the lack of security they were looking for or any evidence of the detainees being in contact with al-Qaida or other militant groups. They did say, however, that the way the detainees were monitored was different from what the administration described in some cases.

A Pentagon spokesman said Tuesday that the Web site WikiLeaks could soon publish more material that was stolen from classified military computer networks. Among the files that WikiLeaks could release is a large encrypted document called "insurance" that users can download from the site. However, WikiLeaks has not released a decryption key for the document. In addition, it remains unclear whether the Pentagon has decrypted the insurance file. According to Pentagon spokesman Col. David Lapan, the Department of Defense does not know exactly what information WikiLeaks has because it is not entirely certain what the contents of the insurance file are. Another defense official noted, however, that the Pentagon's investigation into Private First Class Bradley Manning--who has been arrested and charged with giving WikiLeaks classified material--has given DoD some idea of what may be in the insurance file. As part of that investigation, authorities were able to examine computers used by Manning to find other material he downloaded and may have given to WikiLeaks. Manning has allegedly bragged to another hacker that he had access to a number of diplomatic cables. Speculation about the release of more documents by WikiLeaks comes several days after the site released nearly 400,000 U.S. military reports from the war in Iraq, which included documents detailing thousands of unreported civilian deaths and the involvement of U.S. officials in the torture of Iraqis by local security forces.

The cloud is still a virtual no man's land when it comes to the security of the information stored there. That is the conclusion of Courion's first annual 2010 Access Assurance Survey, which found that one in seven companies admit they recognize there are potential access breaches in their cloud platforms, but they do not know how to locate them. The survey also revealed that there is widespread confusion about who is in charge of securing information in the cloud, with nearly 80 percent of respondents unable to identify the chief entity responsible. The worldwide survey of 384 business managers from large companies—86 percent of which had 1,000 or more employees—indicated that cloud security controls are not keeping up with the rapid pace of cloud adoption. Furthermore, the dearth of knowledge about which platforms or applications workers may access is actually on the rise, up nearly 10 percent from 2009. Close to half of the respondents said they believe a compliance audit of their cloud-based applications could reveal some unauthorized access by users. An additional 15.7 percent confessed they are cognizant of the existence of potential access violations, but they do not know how to find them. Although more than 65 percent said that the company from which the data originates, the application provider, and the cloud service provider are all accountable, an additional 13 percent expressed uncertainty. Businesses are less confident this year than last year that they can deter fired employees from accessing one or more information technology systems. "These results show that many organizations are not currently doing the proper due diligence to ensure that sensitive data is being accessed by the right employees on-premise, not to mention when data is housed by a third party provider," the report states. "The responses indicate that the problem is getting worse, and is only being exacerbated by the increasing use of cloud-based applications, which creates more access violation risk."

People have some conflicting attitudes about mobile security, according to a Juniper Networks survey of 6,000 people in 16 countries. The study found that 80 percent of people said that security was a top priority when purchasing or using a smartphone. However, the survey also found that 70 percent of people store sensitive data on their mobile devices without using any type of security measures. In addition, the survey found that the use of smartphones by employees can compromise the security of corporate networks. Among the employees who took part in the survey, 59 percent said that they used their smartphone for business without obtaining permission to do so. The survey also found that there has been a 250 percent increase in the number of threats to mobile devices over the past year. Nearly two-thirds of all reported smartphone infections were spyware that was capable of monitoring communication from the mobile device, while an additional 17 percent of infections were text message Trojans that charged fees to the victim's cell phone bill.

Dot-com is the top-level domain most likely to infect computers with malware. Previously, Cameroon's .cm ccTLD was the top TLD for malware, according to third annual study of the Web's most dangerous areas conducted by McAfee. Fifty-six percent of Web sites tagged as "risky" ended in .com, according to the most recent survey. That figure is out of a total of 6.2 percent of about 27 million sites that are considered to pose a risk, up from 5.8 percent a year ago. Sites registered under Vietnam's .vn ccTLD are considered the most risky of country domains, with 29 percent posing a potential security threat. Cameroon is now ranked second in that category."Cybercriminals target regions where registering sites is cheap and convenient and pose the least risk of being caught," says McAfee Labs research director Paula Greve. "A domain that's safe one year can be dangerous the next." The risk factor for Singapore's .sg domain dropped significantly following an improved crackdown on scam registrations orchestrated by domain managers.

U.S. Transportation Department Web sites that publish stimulus spending updates could be prey for attackers looking to hack visitors' computers and alter data, according to the department's inspector general. Last December, the IG's office began investigating safeguards for the platforms that follow the $48 billion Congress authorized Transportation to invest in infrastructure projects that create jobs, such as high-speed rail and road expansions. The Recovery Act requires agencies to keep the public abreast of stimulus spending via Recovery.gov, but most agencies also manage in-house Web platforms for financial management and more transparent reporting. The IG's report revealed 1,759 high-risk threats to Web sites under Transportation's purview. Recovery-related databases and servers also were frequent targets of attack, but at a lower risk. The threats were present because Transportation neglected to configure its sites, databases, and servers according to uniform controls, the report says. "One particular vulnerability, found on eight of the 13 Web sites, could allow hackers to use the Web sites to launch attacks on users' computers," says IG's Earl Hedges.

New technologies that allow voters to cast ballots using the Internet or other electronic means are gaining popularity in the United States and elsewhere, despite growing security concerns. Thirty-three U.S. states are allowing some email, fax, or online ballots in 2010, according to the Verified Voting Foundation (VVF). These systems have the potential to increase voter participation but their security remains in question. For example, University of Michigan computer scientists recently hacked into a Washington D.C. pilot Internet voting system and changed the password directing the system to play the university fight song. "Within the first three hours or so of looking at the code we found the first open door and within 36 hours we had taken control of the system," according to Michigan professor Alex Halderman. He says that during the attack they discovered that hackers from Iran and China also were trying to hack into the system. "After this, there can be no doubt that the burden of proof in the argument over the security of Internet voting systems has definitely shifted to those who claim that the systems can be made secure," says VVF chairman David Jefferson.

5 Steps to Successful IT Consolidation Has your Enterprise made the strategic decision to consolidate remote site IT infrastructure into central data centers? Then you have probably discovered that consolidation projects are fraught with technical, organization, and implementation challenges that require a well thought-out strategy. Click to Continue

Skip the Disk ESG predicts 40% of companies will leverage cloud-based data protection by year's end. See if your organization is ready to take advantage of avoiding tape and secondary disk, shifting the burden of complex backup processes , increasing availability of existing servers, and more, Read now

Eliminate Tape Once and for All Like many small to mid-size businesses, a Boston-based Toyota dealer was faced with tape capacity constraints, a shortage of physical space and limited IT resources. Learn how automated cloud data protection reduced tape backup costs by 70% and reduced storage needs of PC backups by 90% while providing bullet-proof disaster recovery. Read Now

The Google Android Quiz Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.